Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 20:19
Behavioral task
behavioral1
Sample
69e3b51daeeecf38b1f349b08dc3bff0924bea32bdd7ec32ea244b57ff4e3d24.dll
Resource
win7-20241023-en
windows7-x64
9 signatures
120 seconds
General
-
Target
69e3b51daeeecf38b1f349b08dc3bff0924bea32bdd7ec32ea244b57ff4e3d24.dll
-
Size
80KB
-
MD5
972cf2217710bb8e472ceb2d2858120a
-
SHA1
72cbbd4110e745b386e7a4a7ecfb0cb74da8b439
-
SHA256
69e3b51daeeecf38b1f349b08dc3bff0924bea32bdd7ec32ea244b57ff4e3d24
-
SHA512
3ee1250309923ea4a6d81dbda53c9a6d876dd1e58e5509d33991c312bc18863f1d434af032e4ab529a760ed68259e105064ba0c4f0b260836d001cf19154f267
-
SSDEEP
1536:uIcs6msUvrh8ErMInQ+4cw9NVWfjaRkE4LEl8B60Y2lfxxHZPEmywZqD:dcs6v68Erj3w9zWf+SEFuk0/pfPPywZQ
Malware Config
Signatures
-
pid Process 4292 arp.exe 2260 arp.exe 1780 arp.exe 2444 arp.exe 4784 arp.exe 2540 arp.exe 1424 arp.exe 4884 arp.exe 392 arp.exe -
resource yara_rule behavioral2/memory/4476-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/4476-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1676 4476 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4476 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 516 wrote to memory of 4476 516 rundll32.exe 83 PID 516 wrote to memory of 4476 516 rundll32.exe 83 PID 516 wrote to memory of 4476 516 rundll32.exe 83 PID 4476 wrote to memory of 1780 4476 rundll32.exe 84 PID 4476 wrote to memory of 1780 4476 rundll32.exe 84 PID 4476 wrote to memory of 1780 4476 rundll32.exe 84 PID 4476 wrote to memory of 2260 4476 rundll32.exe 88 PID 4476 wrote to memory of 2260 4476 rundll32.exe 88 PID 4476 wrote to memory of 2260 4476 rundll32.exe 88 PID 4476 wrote to memory of 4292 4476 rundll32.exe 89 PID 4476 wrote to memory of 4292 4476 rundll32.exe 89 PID 4476 wrote to memory of 4292 4476 rundll32.exe 89 PID 4476 wrote to memory of 392 4476 rundll32.exe 90 PID 4476 wrote to memory of 392 4476 rundll32.exe 90 PID 4476 wrote to memory of 392 4476 rundll32.exe 90 PID 4476 wrote to memory of 4884 4476 rundll32.exe 91 PID 4476 wrote to memory of 4884 4476 rundll32.exe 91 PID 4476 wrote to memory of 4884 4476 rundll32.exe 91 PID 4476 wrote to memory of 1424 4476 rundll32.exe 92 PID 4476 wrote to memory of 1424 4476 rundll32.exe 92 PID 4476 wrote to memory of 1424 4476 rundll32.exe 92 PID 4476 wrote to memory of 2540 4476 rundll32.exe 93 PID 4476 wrote to memory of 2540 4476 rundll32.exe 93 PID 4476 wrote to memory of 2540 4476 rundll32.exe 93 PID 4476 wrote to memory of 4784 4476 rundll32.exe 94 PID 4476 wrote to memory of 4784 4476 rundll32.exe 94 PID 4476 wrote to memory of 4784 4476 rundll32.exe 94 PID 4476 wrote to memory of 2444 4476 rundll32.exe 95 PID 4476 wrote to memory of 2444 4476 rundll32.exe 95 PID 4476 wrote to memory of 2444 4476 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69e3b51daeeecf38b1f349b08dc3bff0924bea32bdd7ec32ea244b57ff4e3d24.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69e3b51daeeecf38b1f349b08dc3bff0924bea32bdd7ec32ea244b57ff4e3d24.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 5b-4c-b8-7a-6e-783⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2260
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 49-3f-b0-9a-2c-b93⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4292
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.76.21 0e-8e-c6-7f-b8-783⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:392
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 8d-07-56-d5-40-f43⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4884
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 57-d8-4d-32-2a-9f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1424
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 e1-aa-4a-8b-c1-663⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2540
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 d7-04-a8-06-c5-a73⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4784
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 0a-23-0a-a1-b3-9f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 7123⤵
- Program crash
PID:1676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4476 -ip 44761⤵PID:4868